scholarly journals High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms

Author(s):  
Mohamed El-Hadedy ◽  
Danilo Gligoroski ◽  
Svein J. Knapskog

Information security is an important task on multimedia and communication world. During storing and sharing maintaining a strategic distance from the outsider access of information is the difficult one. There are many encryption algorithms that can provide data security. In this paper two of the encryption algorithms namely AES and RSA are implemented for color images. AES (Advanced Encryption Standard) is a symmetric key block cipher published in December 2001 by NSIT (National Institute of Standards and Technology). RSA (Rivest-Shamir-Adleman) is an asymmetric key block cipher. It uses two separate keys, one for encryption called the public key and other for decryption called the private key. Both the implementation and analysis are done in Matlab. The quality and security level of both the algorithms is analysed based on various criteria such as Histogram analysis, Correlation analysis, Entropy analysis, NPCR (Number of Pixel Change Rate), UACI (Unified Average Changing Intensity), PSNR (Peak Signal-to-Noise Ratio).


2016 ◽  
Vol 66 (6) ◽  
pp. 582 ◽  
Author(s):  
Harish Kumar Sahu ◽  
Vikas Jadhav ◽  
Shefali Sonavane ◽  
R.K. Sharma

International data encryption algorithm (IDEA) is a secret key or symmetric key block cipher. The purpose of IDEA was to replace data encryption standard (DES) cipher, which became practically insecure due to its small key size of 56 bits and increase in computational power of systems. IDEA cipher mainly to provide data confidentiality in variety of applications such as commercial and financial application e.g. pretty good privacy (PGP) protocol. Till 2015, no successful linear or algebraic weaknesses IDEA of have been reported. In this paper, author explained IDEA cipher, its application in PGP and did a systematic survey of various attacks attempted on IDEA cipher. The best cryptanalysis result which applied to all keys could break IDEA up to 6 rounds out of 8.5 rounds of the full IDEA cipher1. But the attack requires 264 known plaintexts and 2126.8 operations for reduced round version. This attack is practically not feasible due to above mention mammoth data and time requirements. So IDEA cipher is still completely secure for practical usage. PGP v2.0 uses IDEA cipher in place of BassOmatic which was found to be insecure for providing data confidentiality.


2012 ◽  
Vol 39 (7) ◽  
pp. 16-18
Author(s):  
Abhijit Chowdhury ◽  
Angshu Kumar Sinha ◽  
Saurabh Dutta
Keyword(s):  

this modern era of security, public key cryptography is quite popular and holds a great significance. Various public key cryptosystems are available in today’s environment such as RSA and ECC. Elliptic Curve cryptography is beneficial in a lot of aspects which includes shorter key as compared to other cryptosystems, high security, fast processing speed, low storage, low bandwidth, small software print, low hardware implementation costs, high performance. The main and the costliest step in ECC is the Scalar Multiplication. In scalar multiplication, integer multiple of an element in additive group of elliptic curves is calculated. In this paper, we compare various available algorithms for the scalar multiplication used in ECC.


2021 ◽  
Vol 6 (1) ◽  
pp. 188-193
Author(s):  
Dr.V.J. Arulkarthick

Light weight cryptography has been a prominent sector in exploring the cryptanalytics in contemporary world. In this paper, an elevated production capable structure and pliant implementations of hardware by SPECK, which is a lightly weighted block cipher is presented. This lightly weighted SPECK can be accustomed to diminish the retardation of critical path, a tree structure for the realization of Sklansky adder which is an efficient parallel prefix adder operation is used.


2014 ◽  
Vol 644-650 ◽  
pp. 2768-2771
Author(s):  
Hui Shi ◽  
Jian Wei Lu ◽  
Yu Feng Ji ◽  
Chao Wu ◽  
Jing Gong ◽  
...  

The key-stream generator is the most important algorithm component of the stream cipher and the security of the stream cipher is based on the property of the key-stream generator. At the present, it is still an important development direction of the stream cipher algorithm that the high performance key-stream generators are constructed with complex block cipher algorithms. This paper puts forward the new type of the key-stream generator based on the AES algorithm. This method is based on the OFB mode of the AES algorithm, combined with the variable-step feedback shift. Then the paper analyses the randomness of the key-stream produced by the new key-stream generator. This new key-stream generator really improves the cryptographic properties of the key stream generator and to enhance the security of stream cipher effectively.


Author(s):  
A. Curiger ◽  
H. Bonnenberg ◽  
R. Zimmermann ◽  
N. Felber ◽  
H. Kaeslin ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document